Splunk® Enterprise

Securing Splunk Enterprise

Secure and protect your Splunk Enterprise deployment network

Splunk Enterprise is designed to run on a trusted network, with limited or no access from the outside world. It is not designed to operate directly on the Internet without protections in place, such as a web application firewall (WAF), load balancer, or virtual private network (VPN).

Run Splunk Enterprise on a trusted network

In nearly all cases, run Splunk Enterprise deployments inside of a trusted network, in accordance with the security policy of your organization.

  • If you must expose your Splunk Enterprise deployment to the internet, consider deploying multiple redundant instances behind a web application firewall or load balancer
  • Limit external access through a VPN
  • Institute protections against distributed denial-of-service (DDoS) attacks and use services like rate limiting to reduce the number of requests that reach the deployment

Maintain stability on and accessibility to your Splunk Enterprise deployment

If Splunk Enterprise runs inside a trusted network, and you have provided network infrastructure to shield the deployment from potentially malicious outside actors, you can ensure the instance runs stably and as you expect by providing the environment with the computing infrastructure it needs to perform the workload that your organization requires. This includes, but is not limited to the following:

The Capacity Planning Manual has information on how Splunk Enterprise works with various reference computing hardware architectures and provides information on best practice for scaling the environment based on your specific workload needs.

Last modified on 11 April, 2025
Security updates   Install Splunk Enterprise securely

This documentation applies to the following versions of Splunk® Enterprise: 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.1.7, 9.1.8, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.3.1, 9.2.5, 9.3.0, 9.3.2, 9.3.3, 9.4.0, 9.4.1


Please expect delayed responses to documentation feedback while the team migrates content to a new system. We value your input and thank you for your patience as we work to provide you with an improved content experience!

Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters